(no title)
JonathanBeuys | 2 years ago
In the end, every security mechanism is "plain text". Even ssh keys. When someone gains access to your ssh key, which is just an ascii string, they can log in as you.
JonathanBeuys | 2 years ago
In the end, every security mechanism is "plain text". Even ssh keys. When someone gains access to your ssh key, which is just an ascii string, they can log in as you.
pprotas|2 years ago
I strongly suggest looking into multi-factor authentication, or other modern authorization/security mechanisms if you want to see examples of security systems that are not just plain text.
> Chromium does not display it.
Security by obscurity is not ideal, although I can understand that the lack of this feature in Firefox hinders your usecase.
JonathanBeuys|2 years ago
You would also have to get hold of my machine and get past it's security mechanisms.
You can put as many layers on top of what you call "obscurity". But at the bottom it's still just a simple string that holds the power to authenticate you.
And "multi-factor authentication" does not help with the situation "User is allowed to use this script, so they are also allowed to use that website. Let's open it for them.".